skip to main content
10.1145/3090354.3090393acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdcaConference Proceedingsconference-collections
research-article

Implementation and Performance Evaluation of Intrusion Detection Systems under high-speed networks

Authors Info & Claims
Published:29 March 2017Publication History

ABSTRACT

High-speed networks require a high performance intrusion detection systems (IDS), able to process a large amount of data in real time. So, we have to evaluate IDS going to be deployed in such environnement.

In this paper, we present an evaluation approach, based on a series of tests, aiming to measure the performance of the components of an IDS and their effects on the entire system. As well as to study the effect of the characteristics of the deployment environment on the efficiency of the IDS. So, we have implemented the IDS SNORT on machines with different technical characteristics and we have designed a network to generate a set of experiments to measure the performances obtained in the case of a deployment in high-speed networks.

Our experiments have revealed the weaknesses of the IDS in a precise way. Mainly, the inability to process multiple packets and the propensity to deposit, without analysis, packets in high-speed networks with heavy traffic. Our work also determined the effect of a component on the entire system and the effect of hardware characteristics on the performance of an IDS.

References

  1. M. Akhlaq, F. Alserhani, I. Awan, J. Mellor, A. J. Cullen, and A. Al-Dhelaan. Implementation and Evaluation of Network Intrusion Detection Systems. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011. Google ScholarGoogle ScholarCross RefCross Ref
  2. E. Albin and N. C. Rowe. A realistic experimental comparison of the suricata and snort intrusion-detection systems. In Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications Workshops, WAINA '12, pages 122--127, Washington, DC, USA, 2012. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Berthier, W. H. Sanders, and H. Khurana. Intrusion detection for advanced metering infrastructures: Requirements and architectural directions. In 2010 First IEEE International Conference on Smart Grid Communications, pages 350--355, Oct 2010. Google ScholarGoogle ScholarCross RefCross Ref
  4. M. A. Jamshed, J. Lee, S. Moon, I. Yun, D. Kim, S. Lee, Y. Yi, and K. Park. Kargus: A highly-scalable software-based intrusion detection system. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 317--328, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Khorkov. Methods for testing network-intrusion detection systems. Scientific and Technical Information Processing, 39(2):120--126, 4 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Mudzingwa and R. Agrawal. A study of methodologies used in intrusion detection and prevention systems (idps). In 2012 Proceedings of IEEE Southeastcon, pages 1--6, March 2012.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Roesch. Snort - lightweight intrusion detection for networks. In Proceedings of the 13th USENIX Conference on System Administration, LISA '99, pages 229--238, Berkeley, CA, USA, 1999. USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Saber, S. Chadli, M. Emharraf, and I. El Farissi. Modeling and Implementation Approach to Evaluate the Intrusion Detection System. Springer International Publishing, Cham, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  9. M. Saber, S. Chadli, M. Emharraf, and I. E. Farissi. Performance Evaluation of an Intrusion Detection System. Springer International Publishing, Cham, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  10. F. I. Shiri, B. Shanmugam, and N. B. Idris. A parallel technique for improving the performance of signature-based network intrusion detection system. In 2011 IEEE 3rd International Conference on Communication Software and Networks, pages 692--696, May 2011. Google ScholarGoogle ScholarCross RefCross Ref
  11. X. Wang, A. Kordas, L. Hu, M. Gaedke, and D. Smith. Administrative evaluation of intrusion detection system. In Proceedings of the 2Nd Annual Conference on Research in Information Technology, RIIT '13, pages 47--52, New York, NY, USA, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications
    March 2017
    685 pages
    ISBN:9781450348522
    DOI:10.1145/3090354

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 March 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader